Ziyuan Wang

ORCID: 0000-0002-0494-5285
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Testing and Debugging Techniques
  • Software Reliability and Analysis Research
  • Software Engineering Research
  • Advanced Malware Detection Techniques
  • Software System Performance and Reliability
  • Anomaly Detection Techniques and Applications
  • Adversarial Robustness in Machine Learning
  • Big Data Technologies and Applications
  • Engineering and Test Systems
  • Metaheuristic Optimization Algorithms Research
  • Data Quality and Management
  • Digital Games and Media
  • Education and Work Dynamics
  • Employer Branding and e-HRM
  • VLSI and FPGA Design Techniques
  • Speech and Audio Processing
  • Data Mining Algorithms and Applications
  • VLSI and Analog Circuit Testing
  • Security and Verification in Computing
  • Higher Education and Teaching Methods
  • Radiation Effects in Electronics
  • Complex Network Analysis Techniques
  • Music and Audio Processing
  • Web Data Mining and Analysis
  • Artificial Intelligence in Games

Nanjing University of Posts and Telecommunications
2016-2024

Fudan University
2015

Nanjing University
2015

Southeast University
2008

Southeast University
2006-2007

Nanjing Product Quality Supervision and Inspection Institute
2006

Institute of Software
2006

Combinatorial testing is a practical software approach that has been widely used in practice. Most research and applications of such focus on N-way combinatorial provides minimum coverage all interactions among factor. However, the strengths different may not be fixed integer N, but variable. Therefore, variable strength necessary applications. Existing testing, which allows some have higher than others, limitation higher-strength must disjoint. To avoid limitation, an improved approach,...

10.1109/qsic.2008.52 article EN 2008-08-01

10.1016/j.jss.2025.112445 article EN Journal of Systems and Software 2025-03-01

Combinatorial testing could detect the faults triggered by interactions among factors in software. But many cases, pair-wise, N-way and even variable strength combinatorial may lead test suite redundancy fault ability decreasing, because these methods do not make sufficient consideration on actual interaction. In this paper, a new interaction relationship based model was proposed to cover factor software extending conventional IO model. The method be more effectively than existed without...

10.1145/1295074.1295085 article EN 2007-09-03

Java exception mechanism can effectively free a program from abnormal exits and help developers locate faults with the tracing stacks. It is necessary to verify whether handling constructs are arranged appropriately. Some approaches have been developed evaluate test sets improve quality of them, so that they raise more number exceptions in programs. Mutation analysis practical method sets. This paper presents some new mutation operators for constructs. Moreover, equivalent mutants be...

10.1109/compsac.2009.192 article EN 2009-01-01

We propose a convolutional neural network architecture with k-max pooling layer for semantic modeling of music. The aim music model is to analyze and represent the content purposes classification, discovery, or clustering. used in make it possible pool k most active features, capturing semantic-rich time-varying information about Our takes an input as sequence audio words, where each word associated distributed feature vector that can be fine-tuned by backpropagating errors during training....

10.1145/2671188.2749367 article EN 2015-06-22

In the field of deep learning, people strive to construct high-quality neural networks (DNNs) improve accuracy predicting. As well known, quality training data have great impacts on DNN models, since all models are obtained by using these data. However, there is not any reported systematic study how affects model. To relationships between and model quality, we mainly consider four aspects including Skewed Classes, Sample Complexity, Label Quality, Noisy Data in this paper. We design...

10.1145/3361242.3361260 article EN 2019-10-24

Combinatorial testing has been widely utilized in softwares, e.g. Siemens Suite. This paper aims to investigate the reason why combinatorial works Experiments are designed get MFS(minimal failure-causing schema) for Suite, which used as a benchmark evaluate effectiveness of many techniques. The lowerbound fault-detecting probability T-way test suite each program is calculated by analyzing strengths and number MFS faulty version. Computational results could explain

10.1109/icstw.2016.33 article EN 2016-04-01

Combinatorial testing is a specification-based method, which can detect the faults triggered by interaction of factors. For one kind software in interactions only exist between neighbor factors, this paper proposes concept factors combinatorial testing, presents covering array generation algorithms for pair-wise (N=2) coverage, N-way (Nges2) coverage and variable strength proves that arrays generated these three are optimal. Finally we analyze an application scenario, shows approach very practical

10.1109/qsic.2006.31 article EN Proceedings of the ... International Conference on Quality Software/Proceedings 2006-10-01

Background. Mutation testing is a commonly used defect injection technique for evaluating the effectiveness of test suite. However, it usually computationally expensive. Therefore, many mutation reduction strategies, which aim to reduce number mutants, have been proposed. Problem. It important measure ability strategy maintain suite evaluation. existing evaluation indicators are unable “order-preserving ability”, i.e., what extent score order among suites maintained before and after...

10.1145/3522578 article EN ACM Transactions on Software Engineering and Methodology 2022-03-15

PHP (Hypertext Preprocessor) is a scripting language that has been widely used in web development. This paper conducts an empirical study on bugs PHP. By analyzing 35,921 bug reports, 6524 revisions, and root causes of randomly selected 500 bugs, we find that: (1) Among all the 385 versions involved these there are most 4.0.4, 4.0.6, 4.0.3; Documentation mainly distributed 4.y.z 5.y.z; Security primarily relatively later normal 5.y.z. (2) Documentation, Compile, Scripting Engine packages...

10.1142/s0218194022500292 article EN International Journal of Software Engineering and Knowledge Engineering 2022-04-28

Nowadays, people strive to improve the accuracy of deep learning models. However, very little work has focused on quality data sets. In fact, determines model quality. Therefore, it is important for us make research how affects this paper, we mainly consider four aspects quality, including Dataset Equilibrium, Size, Quality Label, Contamination. We deign experiment MNIST and Cifar-10 try find out influence Experimental results show that all have decisive impact It means decrease in these...

10.48550/arxiv.1906.11882 preprint EN other-oa arXiv (Cornell University) 2019-01-01

With the widespread of microblog, microblog platform like Sina has become information provider to release mass information. Mining valuable from and making personalized recommendations have a hotspot recent research. But most researches about primarily focus on user's social circle. The recommendation is mainly based friends or users they follow, study how find with similar hobbies unfamiliar circles rare. Therefore, we propose generation model UT-LDA (User Topic Latent Dirichlet Allocation)...

10.1109/qrs-c.2015.32 article EN IEEE International Conference on Software Quality, Reliability and Security Companion 2015-08-01

As an effective software testing technique, combinatorial has been gradually applied in various types of test practice. In this case, it is necessary to provide useful tools support the application technique on industrial scenarios, as well academic research for technique. To end, basis results group, a suite developed, whose functions include case generation, optimization, and etc. For requirements from both should be configurable, scalable, modular, This paper gives brief introduction...

10.1109/qrs-c.2017.61 article EN 2017-07-01

Inefficient use of memory may cause bloat, and the bloat lead to performance slowdowns or even crashes. To address problem, lots efforts have been devoted diagnosing especially caused by leaks. However, testing identifying executions potentially containing which act as key steps before diagnosing, are still challenging. In this paper, we introduce a specification tool named MemSpec help programmers test inefficiencies in Java programs. The works oracle automatically determine whether program...

10.1109/qrs.2016.46 article EN 2016-08-01

Many test adequacy metrics for deep neural net-works (DNNs) were proposed to measure the quality of testing learning system. The combinatorial coverage neurons was because it considers influence in same layer on next layer. However, is still inconclusive whether beneficial DNNs. We conduct an empirical study MNIST dataset answer how affects fault detection experimental results show a medium or strong correlation between fixed-strength and number adversarial examples Such suggests that...

10.1109/qrs-c55045.2021.00021 article EN 2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C) 2021-12-01

Background. Software testing is a critical activity for ensuring the quality and reliability of software systems. To evaluate effectiveness different test suites, researchers have developed variety metrics. Problem. However, comparing these metrics challenging due to lack standardized evaluation framework including comprehensive factors. As result, often focus on single factors (e.g., size), which finally leads or even contradictory conclusions. After dozens pieces work in detail, we found...

10.1145/3635713 article EN ACM Transactions on Software Engineering and Methodology 2023-12-05

The combinatorial testing technique can detect software faults caused by interactions of different factors (input parameters), using a small number test cases. After fault was detected, its corresponding minimal failure-causing schemas should be identified to help fix such fault. In this paper, we propose an approach calculate based on the relational tree model. Such could without generating additional Case studies show us that proposed method identify effectively and efficiently.

10.1109/qrs-c51114.2020.00021 article EN 2020-12-01
Coming Soon ...